Home  >  Service  >  Information security  >  Internet rules

Internet rules

Updated 2021/05/19

 

When using a computer connected to the Internet, the same manners as the general public are required to be observed on the network.
Users should always be responsible and use it to determine if their actions are appropriate.

 

Target persons All students, facultes and staff
Purpose Follow the morals and rules to use the Internet.

 

Acts contrary to the purpose of education and equipment use

 

Accounts and e-mail addresses are distributed for educational and research activities and office work activities. Don't do anything against this purpose.

1. Failure to manage account (user ID) / password
2. Neglecting to manage MyVolume / email (over capacity, etc.)
3. Actions that place a burden on the network
4. Use for other than educational research and office work

* Record of usage (access log)
Most network services keep a record of usage (access log). This record may be used not only for the purpose of obtaining temporary usage statistics but also for the purpose of investigation such as unauthorized use.

 

 

Acts that are against the law

 

The "Act on the Prohibition of Unauthorized Access Act" (Unauthorized Access Prohibition Law) was enforced on February 13, 2000. The following actions are prohibited as "illegal access act" or "encourage unauthorized access act". Violators will be punished legally.

1. Use someone else's account password
2. Provide another person's account password to a third party
3. Invade a computer without an account

The following actions are not allowed because they are on the network. Like the general public, it is against the law. Violators will be punished legally.

1. Publish obscene (obscene images, documents, etc.) on homepage
2. Unauthorized publication of copyrighted works (photos, pictures, documents, etc.)
3. Human rights violations due to slander and discriminatory statements
4. Infringement of privacy due to unauthorized disclosure of emails, photos, etc.
5. Illegal copy of software (paid)

 

 

Annoying behavior

 
In order to use the network comfortably, you must not perform any acts that are annoying to others.

1. Send chain mail (letter of misfortune etc.)
2. Give the name of an anonymous person
3. Send solicitation / questionnaire emails to unspecified number of people
4. Disseminate hoax information
5. Computer occupation

 

 

Rules for sending email

 

There are manners that you should be careful about when sending emails. Let's be careful not to bother the other party without knowing it.

  1. E-mail address is correct
    Of course, mistake emails are a nuisance. Be careful not to mistake your own address or destination address.
  2. Write emails that can be read by the other party
  3. Be sure to include Subject
    It is kinder to be able to imagine the content from the title. Kanji can be used on campus, but Kanji may not be used overseas. Let's watch out.
  4. Refrain from sending content that is difficult for people to see
    The complete confidentiality of email is not guaranteed.
  5. Do not send chain mail
    If you receive a chain mail (such as a letter of unhappiness), do not forward it. You will also send a chain mail.
  6. Specify who you are
    An email address alone cannot identify who the sender is.

 

 

Rules for receiving email

 

The received mail may contain a virus. Be very careful when opening emails from strangers or emails whose subject is in a foreign language.

  1. Judging the content of the email yourself
    There is a possibility that the content of the sent email is hoax. Whether you believe or not is your judgment.
  2. Be careful when handling emails from strangers
    There is a possibility that the virus is hidden in the file attached to the email.
    You can discard emails from people you don't know.

 

 

Rules for viewing the homepage (WWW)

 

Access to sites that introduce new products from Center for Science Information using a web browser, sites that distribute their own software, sites that can discuss, sites that tell you what you did not know, and sites that allow you to shop can do.

  1. Judge at your own risk
    The information on the public site does not necessarily convey the correct information. It is your responsibility to determine whether the information received is accurate.
  2. Do not slander public sites
  3. Protect your own safety
    Do not enter personal information carelessly. The entered information may be misused.

 

 

Rules for publishing personal homepages

 

Students and faculty who have received the notice can open a personal website for academic research activities.

  1. Services for individuals limited to academic research purposes
    Publication for purposes other than academic research is not possible.
  2. Target users are all users with SIC accounts.
  3. Information can be disclosed at your own risk
    Published information will be accessible from all over the world. Careful attention must be paid to the security of the information disclosed by each individual.
  4. Do not violate public order and morals in consideration of copyright laws and personal privacy
  5. Disclosure of content that is against the law is prohibited